CISSP 2024: Risk Management Concepts

CISSP 2024    |    Expert
  • 11 videos | 45m 27s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)
Security risk management involves the continual process of identifying security risks and implementing strategy and tactics to mitigate them. It is a vital component of any organization's strategy to protect its assets, ensure regulatory compliance, maintain operational continuity, and safeguard its reputation. Begin this course by exploring threat and vulnerability identification, as well as risk analysis, assessment, and response. Next, you will discover control categories, types, and assessments. Then you will investigate continuous monitoring and measurement and risk management reporting. Finally, you will examine continuous improvement and risk frameworks as you gain the essential skills to protect and secure your organization's critical resources. This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe threat and vulnerability identification
    Define risk analysis, assessment, and scope
    Describe risk response and treatment, including cybersecurity insurance
    Compare applicable categories and types of controls such as preventive, detection, corrective
    Provide an overview of control assessments, such as for security and privacy
  • Describe various aspects of continuous monitoring and measurement
    Describe risk management reporting, including both internal and external
    Define continuous improvement, such as in risk maturity modeling
    Compare risk frameworks such as iso, nist, and cobit
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 40s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 4m 1s
    After completing this video, you will be able to describe threat and vulnerability identification. FREE ACCESS
  • Locked
    3.  Risk Analysis, Assessment, and Scope
    8m 49s
    Upon completion of this video, you will be able to define risk analysis, assessment, and scope. FREE ACCESS
  • Locked
    4.  Risk Response and Treatment
    4m 31s
    After completing this video, you will be able to describe risk response and treatment, including cybersecurity insurance. FREE ACCESS
  • Locked
    5.  Control Categories and Types
    5m 10s
    Upon completion of this video, you will be able to compare applicable categories and types of controls such as preventive, detection, corrective. FREE ACCESS
  • Locked
    6.  Control Assessments
    3m 9s
    After completing this video, you will be able to provide an overview of control assessments, such as for security and privacy. FREE ACCESS
  • Locked
    7.  Continuous Monitoring and Measurement
    3m 26s
    Upon completion of this video, you will be able to describe various aspects of continuous monitoring and measurement. FREE ACCESS
  • Locked
    8.  Risk Management Reporting
    3m 30s
    After completing this video, you will be able to describe risk management reporting, including both internal and external. FREE ACCESS
  • Locked
    9.  Continuous Improvement
    8m 5s
    Upon completion of this video, you will be able to define continuous improvement, such as in risk maturity modeling. FREE ACCESS
  • Locked
    10.  Comparing Risk Frameworks
    3m 24s
    After completing this video, you will be able to compare risk frameworks such as ISO, NIST, and COBIT. FREE ACCESS
  • Locked
    11.  Course Summary
    43s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 212 users Rating 4.6 of 212 users (212)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)